{"title":"An auction for scheduling delivery of highly demanded products","authors":"Sameer Korrapati, Peter R. Wurman","doi":"10.1109/ICECT.2005.17","DOIUrl":"https://doi.org/10.1109/ICECT.2005.17","url":null,"abstract":"We present a simple auction protocol for the sale of over-demanded goods with a delivery schedule. Under some reasonable assumptions, our mechanism is incentive compatible, collects only partial information about bidder's valuations, and empirical evidence suggests it converges to the efficient allocation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing e-business-intelligence-service: a topic-guided text summarization framework","authors":"Shuhua Liu","doi":"10.1109/ICECT.2005.45","DOIUrl":"https://doi.org/10.1109/ICECT.2005.45","url":null,"abstract":"Text summarization is a very important function in next generation e-business-intelligence-service. While human beings have proven to be extremely capable summarizers, computer based automated abstracting and summarizing has proven to be extremely challenging tasks. The dominant approach to text summarization is selection-based, by which the most content-bearing sentences or passages are identified and selected to compose a summary. However, the results from such a process often suffer from flaws such as incoherent content and poor readability due to unclear relationships between the selected text excerpts, dangling references, and so on. In this paper, we present a process model of topic guided text summarization - TIDE. By directing the content selection process with identified topic structure of the text, the logical relation between the selected sentences is captured and better presented, which is also valuable resource for a more complete and precise understanding of text meaning in the next stage of processing.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An auction mechanism for polynomial-time execution with combinatorial constraints","authors":"A. Andersson, J.-A. Holmstrom, Mattias Willman","doi":"10.1109/ICECT.2005.103","DOIUrl":"https://doi.org/10.1109/ICECT.2005.103","url":null,"abstract":"In this paper, we focus on the fact that even if we ignore the computational hardness of winner determination, a combinatorial auction is in many situations unlikely to produce the most efficient allocation. This is because each bidder has an exponential number of combinations to bid on, and basically only her own valuations as help when selecting combinations. This paper is based on the conjecture that for a large class of auction instances, given a reasonable restriction on the input each bidder can provide, there exists an auction mechanism where the winner determination problem can be solved in polynomial time, at the same time as the expected result is more efficient than that of a conventional combinatorial auction. The evidence is given by explicitly describing such an auction mechanism, and by simulation results.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128120050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pareto-efficiency without giving-in: a two-phased protocol for multiple-attribute negotiations","authors":"Florian Lang, Constantin Brunn","doi":"10.1109/ICECT.2005.64","DOIUrl":"https://doi.org/10.1109/ICECT.2005.64","url":null,"abstract":"Multiple-attribute contracting allows the alignment of consumers' complex demand profiles and the specific delivery capabilities of suppliers. A two-phased negotiation model is introduced that includes both self-interested negotiations driven by a heuristic strategy and a joint-gains approach to win/win-negotiations. The concept of Pareto-efficiency on imperfect markets (integrative phase) is combined with a strategy-driven, non-altruistic approach to individual utility maximization (distributive phase). The concept of an agent based market is illustrated by grid services as an example negotiation object. The outlined mechanism is evaluated using the \"GeneLab\" simulation environment that allows to benchmark individual utility gains.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing a RosettaNet business-to-business integration platform using J2EE and Web services","authors":"Juho Tikkala, P. Kotinurmi, T. Soininen","doi":"10.1109/ICECT.2005.52","DOIUrl":"https://doi.org/10.1109/ICECT.2005.52","url":null,"abstract":"E-business frameworks provide standards and specifications for integrating enterprise applications of business partners with less effort. We report experiences from developing a prototype implementing the messaging part of the RosettaNet e-business framework using commonly available open source tools. The requirements, design and implementation of the prototype are presented. The tools turned out to be suitable for the task, but some problems exist that e.g. limit the maximum message size. In addition, interoperability problems between different implementations of RosettaNet messaging arose due to RosettaNet using low expressive power message specification languages, thus leaving room for interpretation regarding message validation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Promotional and commercial content distribution based on a legal and trusted P2P framework","authors":"M. Schmucker, P. Ebinger","doi":"10.1109/ICECT.2005.71","DOIUrl":"https://doi.org/10.1109/ICECT.2005.71","url":null,"abstract":"Peer-to-peer (P2P) file sharing systems have reached high popularity among computer users. They neither have a single point of failure nor a central bottleneck. Other benefits include scalability, load balancing, and fault tolerance. The distributed nature of P2P file sharing systems transfers the direct costs of storage and networking from the provider to the user. Unfortunately, P2P networks are also often used for content distribution that violates intellectual property rights (IPR). In this article, we show how a P2P file sharing system which adheres to IPR laws can be built. In contrast to existing digital rights management (DRM) systems which strongly interfere with accustomed content usage, our suggested solution does not impede familiar usage patterns and new content can be provided easily. The primary aim for the development of this architecture is to support new and niche artists by enabling the distribution of free and promotional content, however, the system can also be extended for the commercial distribution of content. Fingerprinting and cryptographic hash technologies are utilized to ensure legal and secure content distribution. Our proposed content distribution system is based on a self policing method whereby each user's content and activities are scrutinized by the peers they are exchanging content with. This allows the mutual monitoring of content between the communicating peers on the network and therefore, only authorized files can be exchanged. Finally, this model ensures that a user is liable for the distribution of non-authorized files.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132265430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy using one-round zero-knowledge proofs","authors":"Sultan Almuhammadi, C. Neuman","doi":"10.1109/ICECT.2005.78","DOIUrl":"https://doi.org/10.1109/ICECT.2005.78","url":null,"abstract":"A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal with critical applications in security e-commerce. Existing ZKPs are iterative in nature; their protocols require multiple communication rounds. The cost of iteration makes ZKPs unsuitable in practice. We propose a new protocol that meets all the requirements of ZKPs, yet runs in one round. The new approach substantially reduces computation and communications costs. It makes ZKPs more suitable for practical cryptographic systems for both government and commercial applications.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranking-based business information processing: applications to business solutions and eCommerce systems","authors":"Mao Chen, J. Sairamesh","doi":"10.1109/ICECT.2005.74","DOIUrl":"https://doi.org/10.1109/ICECT.2005.74","url":null,"abstract":"Extracting crucial information in high volume business data efficiently are critical for enterprises to make timely business decisions and adapt accordingly. This paper proposes a novel ranking-based system that applies knowledge models and utility functions. In a case study for monitoring and analyzing automotive failures in aftermarket services, we shed a light on our ranking mechanism that combines objective business metrics and \"subjective\" domain knowledge. Our experiments using real-world data demonstrate that our methodology is capable of capturing macro view about business performance issues from a small but important fraction of information.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an integrated privacy framework for HIPAA-compliant Web services","authors":"Vivying S. Y. Cheng, P. Hung","doi":"10.1109/ICECT.2005.95","DOIUrl":"https://doi.org/10.1109/ICECT.2005.95","url":null,"abstract":"A Web service is a software system designed to support interoperable application-to-application interaction over the Internet. Web services are based on a set of XML standards, such as universal description, discovery and integration (UDDI), Web services description language (WSDL), and simple object access protocol (SOAP). Based on prior studies, this paper proposes a vocabulary-based Web services privacy framework for protecting health data privacy under the Health Insurance Portability and Accountability Act of 1996 (HIPAA).","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Push concepts to control interactions in e-commerce","authors":"S. Robra-Bissantz, A. Zabel","doi":"10.1109/ICECT.2005.72","DOIUrl":"https://doi.org/10.1109/ICECT.2005.72","url":null,"abstract":"As empirical studies show, customers often stop synchronous communication with a supplier during e-commerce processes. In order to overcome these stoppages, Push concepts on the interaction level take over or at least trigger customer activities. On the one hand this supports the customer in continuing his/her communication with the Web-shop, on the other hand it helps the supplier to regain control of transaction processes. This article deals with the identification of push opportunities on interaction level and shows concepts for individual push activities. These push concepts are prototypically implemented in a push system that may complement any shop system. For first experiences in a practical setting it is introduced to the customer portal of REHAU AG+Co.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}